true
Intelligence Sharing in the Time of COVID-19 Over the past few months, the world of information sharing has started to come together with security integration and automation. First, the ... Read More
COVID-19: Early Lessons for Cybersecurity Operators News broke the other day that there were at least two cases of COVID-19 in Santa Clara County, California as early as February 6, well before the ... Read More
Intelligence Management and Gartner's SOAR: Thinking About Workflow First Gartner's Security Orchestration Automation and Response (SOAR) market category was announced in November 2017, and since then we've seen numerous ... Read More
New Research from Cloud Security Alliance: Building a Foundation for Successful Cyber Threat Intelligence Exchange This week at the 2018 RSA Conference, the Cloud Security Alliance released a new framework for Building a Foundation for Successful Cyber Threat ... Read More
New E-Book: 5 Steps to Optimizing Your Threat Intelligence If you want to know how TruSTAR really feels about the state of threat intelligence today, look no further. Read More
How TruSTAR Aligns With Dark Reading’s 6 Steps for Sharing Threat Intelligence Late last week, Steve Zurier of Dark Reading published an insightful article covering the 6 Steps for Sharing Threat Intelligence in collaboration ... Read More
Cyber Awareness Month: When is not knowing acceptable? October is Cybersecurity Awareness Month. This has been true for the last 14 years. As each year passes rather than becoming aware of how to better ... Read More
Overcoming the Legal Barriers to Information Sharing Today the Retail Cyber Incident Analysis Center (R-CISC) released some useful guidance on the utility of the Cybersecurity Act of 2015 and how it ... Read More
WannaCry: Seeing the Bigger Picture   Read More
Commodity Ransomware is Here Brian Krebs recently posted a blog on a slick ransomware-as-a-service interface called “Philadelphia,” enabling almost anyone to launch a ransomware ... Read More